Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

DOJ Asked NASDAQ to Delay Disclosure of Security Breach

Touting “the highest level of security available to protect confidential board communications,” the NASDAQ on Saturday acknowledged that its Directors Desk platform had been compromised and had been infected with an undisclosed “suspicious file.”

Touting “the highest level of security available to protect confidential board communications,” the NASDAQ on Saturday acknowledged that its Directors Desk platform had been compromised and had been infected with an undisclosed “suspicious file.”

Directors Desk is a solution to help board members communicate and collaborate securely, which the company says is used by more than 10,000 directors around the globe. According the Web Site, “Directors Desk incorporates state-of-the-art technology, processes and protocols to ensure the highest level of security.” Apparently the “highest level of security” wasn’t enough in this case.

Interestingly, NASDAQ OMX said that after discovering the suspicious files and initiating an investigation, the U.S. Department of Justice requested that the NASDAQ hold back on disclosing the incident to customers until at least February 14th. However, after news broke about the potential compromise of NASDAQ systems on Saturday, the company issued a statement on the incident.

Seeing that this incident appears to be targeted to the Directors Desk service, it doesn’t appear to be an attack designed to target trading operations on the exchange. It will be interesting to see additional details as they are released, but seems like it could be an attempt for a group to gain access to confidential information with the intent to profit. If an attacker was able to successfully gain access to communications taking place on the Directors Desk platform, it would surely provide incredible inside information which could lead to serious profits. Access to the communications of 10,000 directors? That’s some powerful information, and having access to it would make having a Bloomberg terminal, the golden tool for traders, seem trivial.

While many details have yet to be uncovered (or at least released), the company did issue a statement, and importantly noted that this incident is completely unrelated to the NASDAQ trading platforms which power the exchange and that trading operations would not be affected.

The NASDAQ issued the following state on Saturday.

Through our normal security monitoring systems we detected suspicious files on the U.S. servers unrelated to our trading systems and determined that our web facing application Directors Desk was potentially affected. We immediately conducted an investigation, which included outside forensic firms and U.S. federal law enforcement. The files were immediately removed and at this point there is no evidence that any Directors Desk customer information was accessed or acquired by hackers. Our trading platform architecture operates independently from our web-facing services like Directors Desk and at no point was any of NASDAQ OMX’s operated or serviced trading platforms compromised.

Subsequently, the U.S. Department of Justice requested that we refrain from providing notice to our customers until, at the earliest, February 14, 2011, in order to facilitate the continuing investigation. NASDAQ OMX was honoring the U.S. Government’s request to delay notification, but when a story ran in the media on Saturday, February, 5, 2011, regarding a hacking incident at NASDAQ OMX, we immediately decided, in consultation with the authorities, that we must inform our customers.

Advertisement. Scroll to continue reading.

We continue to evaluate and enhance our advanced security controls to respond to the ever increasing global cyber threat and continue to devote extensive resources to further secure our systems. Cyber attacks against corporations and government occur constantly. NASDAQ OMX remains vigilant against such attacks. We have been working in cooperation with the Government’s ongoing investigations and have received their technical advice for which we are appreciative.

The NASDAQ plans to continue trading with business as usual on Monday.

SecurityWeek contributor Matt Hines published a column Saturday on how the art of subtle manipulation via cyber attacks could slowly turn electronic markets on their heads by corrupting their very legitimacy. Is this just the start?

Related Reading:

Attackers’ Subtle Markets Manipulation Could Tilt Global Economies

Hedge Fund Manager Predicts Cyber Attack Will Shut Down NYSE in 2011

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.